Handbook of biometric anti-spoofing : presentation attack detection /

Saved in:
Bibliographic Details
Edition:Second edition.
Imprint:Cham, Switzerland : Springer, 2019.
Description:1 online resource
Language:English
Series:Advances in computer vision and pattern recognition
Advances in computer vision and pattern recognition.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11781042
Hidden Bibliographic Details
Other authors / contributors:Marcel, Sébastien, editor.
Nixon, Mark S., editor.
Fierrez, Julian, editor.
Evans, Nicholas, author.
ISBN:9783319926278
3319926276
9783319926261
3319926268
9783319926261
9783319926285
3319926284
Digital file characteristics:text file PDF
Notes:Includes index.
Online resource; title from PDF title page (SpringerLink, viewed January 17, 2019).
Summary:This authoritative and comprehensive handbook is the definitive work on the current state of the art of Biometric Presentation Attack Detection (PAD)? also known as Biometric Anti-Spoofing. Building on the success of the previous, pioneering edition, this thoroughly updated second edition has been considerably expanded to provide even greater coverage of PAD methods, spanning biometrics systems based on face, fingerprint, iris, voice, vein, and signature recognition. New material is also included on major PAD competitions, important databases for research, and on the impact of recent international legislation. Valuable insights are supplied by a selection of leading experts in the field, complete with results from reproducible research, supported by source code and further information available at an associated website. Topics and features: Reviews the latest developments in PAD for fingerprint biometrics, covering optical coherence tomography (OCT) technology, and issues of interoperability Examines methods for PAD in iris recognition systems, and the application of stimulated pupillary light reflex for this purpose Discusses advancements in PAD methods for face recognition-based biometrics, such as research on 3D facial masks and remote photoplethysmography (rPPG) Presents a survey of PAD for automatic speaker recognition (ASV), including the use of convolutional neural networks (CNNs), and an overview of relevant databases Describes the results yielded by key competitions on fingerprint liveness detection, iris liveness detection, and software-based face anti-spoofing Provides analyses of PAD in fingervein recognition, online handwritten signature verification, and in biometric technologies on mobile devices Includes coverage of international standards, the E.U. PSDII and GDPR directives, and on different perspectives on presentation attack evaluation This text/reference is essential reading for anyone involved in biometric identity verification, be they students, researchers, practitioners, engineers, or technology consultants. Those new to the field will also benefit from a number of introductory chapters, outlining the basics for the most important biometrics.
Other form:Print version: Marcel, Sébastien. Handbook of Biometric Anti-Spoofing : Presentation Attack Detection. Cham : Springer, ©2019 9783319926261
Standard no.:10.1007/978-3-319-92627-8
Table of Contents:
  • Intro; Foreword; Preface; List of Reviewers; Contents; Contributors; Part I Fingerprint Biometrics; 1 An Introduction to Fingerprint Presentation Attack Detection; 1.1 Introduction; 1.2 Early Works in Fingerprint Presentation Attack Detection; 1.3 Fingerprint Spoofing Databases; 1.4 A Case Study: Quality Assessment Versus Fingerprint Spoofing; 1.5 Approach 1: Fingerprint-Specific Quality Assessment (FQA); 1.5.1 Ridge Strength Measures; 1.5.2 Ridge Continuity Measures; 1.5.3 Ridge Clarity Measures; 1.6 Approach 2: General Image Quality Assessment (IQA); 1.6.1 Full Reference IQ Measures
  • 1.6.2 No-Reference IQ Measures1.7 Results; 1.7.1 Results: ATVS-FFp DB; 1.7.2 Results: LivDet 2009 DB; 1.8 Conclusions; References; 2 A Study of Hand-Crafted and Naturally Learned Features for Fingerprint Presentation Attack Detection; 2.1 Introduction; 2.1.1 Related Works; 2.2 Hand-Crafted Texture Descriptors; 2.2.1 Local Binary Pattern; 2.2.2 Local Phase Qunatization; 2.2.3 Binarized Statistical Image Features; 2.3 Naturally Learned Features Using Transfer Learning Approaches; 2.4 Experiments and Results; 2.4.1 Database; 2.4.2 Performance Evaluation Protocol
  • 2.4.3 Results on Cooperative Data2.4.4 Results on Non-cooperative Data; 2.5 Conclusions; References; 3 Optical Coherence Tomography for Fingerprint Presentation Attack Detection; 3.1 Introduction; 3.2 Background; 3.2.1 History and Properties of OCT; 3.2.2 Skin Physiology; 3.2.3 Presentation Attack Detection; 3.3 Existing and Ongoing Research; 3.3.1 University of Houston; 3.3.2 Bern University of Applied Sciences; 3.3.3 University of Delaware; 3.3.4 University of Kent; 3.3.5 University of California; 3.3.6 National University of Ireland; 3.3.7 OCT Ingress Project
  • 3.3.8 Council for Scientific and Industrial Research3.4 Other Advantages and Future Work; 3.5 Conclusion; References; 4 Interoperability Among Capture Devices for Fingerprint Presentation Attacks Detection; 4.1 Introduction; 4.2 Review of Fingerprint Presentation Attacks Detection Methods; 4.2.1 Fingerprint Reproduction Process; 4.2.2 Liveness Detection Methods; 4.2.3 Software-Based Methods State of the Art; 4.3 The Interoperability Problem in FPAD Systems; 4.3.1 The Origin of the Interoperability Problem; 4.4 Domain Adaptation for the FPAD Interoperability Problem; 4.4.1 Problem Definition
  • 4.4.2 Experimental Evidences (PS(X) neqPT(X))4.4.3 Proposed Method; 4.5 Experiments; 4.5.1 Transformation Using Only Live Samples; 4.5.2 Number of Feature Vectors; 4.6 Conclusions; References; 5 Review of Fingerprint Presentation Attack Detection Competitions; 5.1 Introduction; 5.2 Background; 5.3 Methods and Datasets; 5.3.1 Performance Evaluation; 5.3.2 Part 1: Algorithm Datasets; 5.3.3 Part 2: Systems Submissions; 5.3.4 Image Quality; 5.3.5 Specific Challenges; 5.4 Examination of Results; 5.4.1 Trends of Competitors and Results for Fingerprint Part 1: Algorithms